Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Your "What" Is My "How": Iteration and Hierarchy in System Design., , , , , and . IEEE Softw., 30 (2): 54-60 (2013)Development of Security Software: A High Assurance Methodology., , , , and . ICFEM, volume 5885 of Lecture Notes in Computer Science, page 266-285. Springer, (2009)Software model checking takes off., , and . Commun. ACM, 53 (2): 58-64 (2010)Machine-Checked Proofs for Realizability Checking Algorithms., , and . VSTTE, volume 9593 of Lecture Notes in Computer Science, page 110-123. Springer, (2015)Model-Checking of Safety-Critical Software for Avionics., , and . ERCIM News, (2008)Requirements Capture and Evaluation in Nimbus: The Light-Control Case Study., , and . J. Univers. Comput. Sci., 6 (7): 731-757 (2000)Inductive Validity Cores., , , and . IEEE Trans. Software Eng., 47 (2): 279-299 (2021)The Risks of Coverage-Directed Test Case Generation., , , and . IEEE Trans. Software Eng., 41 (8): 803-819 (2015)Proofs for Incremental SAT with Inprocessing., and . FMCAD, page 132-140. IEEE, (2023)Architectural Modeling and Analysis for Safety Engineering., , , and . IMBSA, volume 10437 of Lecture Notes in Computer Science, page 97-111. Springer, (2017)